Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: netbudy65

Note! ISC has retired the CAP Exam Contact us through Live Chat or email us for more information.

CAP CAP – Certified Authorization Professional Questions and Answers

Questions 4

Which of the following are the goals of risk management?

Each correct answer represents a complete solution. Choose three.

Options:

A.

Finding an economic balance between the impact of the risk and the cost of the countermeasure

B.

Identifying the risk

C.

Assessing the impact of potential threats

D.

Identifying the accused

Buy Now
Questions 5

Which of the following administrative policy controls requires individuals or organizations to be engaged in good business practices relative to the organization's industry?

Options:

A.

Segregation of duties

B.

Separation of duties

C.

Need to Know

D.

Due care

Buy Now
Questions 6

Bill is the project manager of the JKH Project. He and the project team have identified a risk event in the project with a high probability of occurrence and the risk event has a high cost impact on the project. Bill discusses the risk event with Virginia, the primary project customer, and she decides that the requirements surrounding the risk event should be removed from the project. The removal of the requirements does affect the project scope, but it can release the project from the high risk exposure. What risk response has been enacted in this project?

Options:

A.

Acceptance

B.

Mitigation

C.

Avoidance

D.

Transference

Buy Now
Questions 7

According to U.S. Department of Defense (DoD) Instruction 8500.2, there are eight Information

Assurance (IA) areas, and the controls are referred to as IA controls. Which of the following are among the eight areas of IA defined by DoD?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

DC Security Design & Configuration

B.

VI Vulnerability and Incident Management

C.

EC Enclave and Computing Environment

D.

Information systems acquisition, development, and maintenance

Buy Now
Questions 8

Which of the following NIST publications defines impact?

Options:

A.

NIST SP 800-41

B.

NIST SP 800-37

C.

NIST SP 800-30

D.

NIST SP 800-53

Buy Now
Questions 9

Which of the following are the types of assessment tests addressed in NIST SP 800-53A?

Options:

A.

Functional, penetration, validation

B.

Validation, evaluation, penetration

C.

Validation, penetration, evaluation

D.

Functional, structural, penetration

Buy Now
Questions 10

Which of the following is NOT an objective of the security program?

Options:

A.

Security organization

B.

Security plan

C.

Security education

D.

Information classification

Buy Now
Questions 11

During which of the following processes, probability and impact matrix is prepared?

Options:

A.

Plan Risk Responses

B.

Perform Quantitative Risk Analysis

C.

Perform Qualitative Risk Analysis

D.

Monitoring and Control Risks

Buy Now
Questions 12

Which of the following groups represents the most likely source of an asset loss through the inappropriate use of computers?

Options:

A.

Hackers

B.

Visitors

C.

Customers

D.

Employees

Buy Now
Questions 13

In which of the following phases does the change management process start?

Options:

A.

Phase 2

B.

Phase 1

C.

Phase 4

D.

Phase 3

Buy Now
Questions 14

A security policy is an overall general statement produced by senior management that dictates what role security plays within the organization. What are the different types of policies?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Systematic

B.

Regulatory

C.

Advisory

D.

Informative

Buy Now
Questions 15

Which of the following guidance documents is useful in determining the impact level of a particular threat on agency systems?

Options:

A.

NIST SP 800-41

B.

NIST SP 800-37

C.

FIPS 199

D.

NIST SP 800-14

Buy Now
Questions 16

You are the project manager of the NKJ Project for your company. The project's success or failure will have a significant impact on your organization's profitability for the coming year. Management has asked you to identify the risk events and communicate the event's probability and impact as early as possible in the project. Management wants to avoid risk events and needs to analyze the cost-benefits of each risk event in this project. What term is assigned to the low-level of stakeholder tolerance in this project?

Options:

A.

Risk avoidance

B.

Mitigation-ready project management

C.

Risk utility function

D.

Risk-reward mentality

Buy Now
Questions 17

Which of the following refers to an information security document that is used in the United States Department of Defense (DoD) to describe and accredit networks and systems?

Options:

A.

SSAA

B.

FIPS

C.

FITSAF

D.

TCSEC

Buy Now
Questions 18

Gary is the project manager of his organization. He is managing a project that is similar to a project his organization completed recently. Gary has decided that he will use the information from the past project to help him and the project team to identify the risks that may be present in the project. Management agrees that this checklist approach is ideal and will save time in the project. Which of the following statement is most accurate about the limitations of the checklist analysis approach for Gary?

Options:

A.

The checklist analysis approach is fast but it is impossible to build and exhaustive checklist.

B.

The checklist analysis approach only uses qualitative analysis.

C.

The checklist analysis approach saves time, but can cost more.

D.

The checklist is also known as top down risk assessment

Buy Now
Questions 19

Eric is the project manager of the MTC project for his company. In this project a vendor has offered Eric a sizeable discount on all hardware if his order total for the project is more than $125,000. Right now, Eric is likely to spend $118,000 with vendor. If Eric spends $7,000 his cost savings for the project will be $12,500, but he cannot purchase hardware if he cannot implement the hardware immediately due to organizational policies. Eric consults with Amy and Allen, other project managers in the organization, and asks if she needs any hardware for their projects. Both Amy and Allen need hardware and they agree to purchase the hardware through Eric's relationship with the vendor. What positive risk response has happened in this instance?

Options:

A.

Transference

B.

Exploiting

C.

Sharing

D.

Enhancing

Buy Now
Questions 20

You are the project manager of the NKQ project for your organization. You have completed the quantitative risk analysis process for this portion of the project. What is the only output of the quantitative risk analysis process?

Options:

A.

Probability of reaching project objectives

B.

Risk contingency reserve

C.

Risk response

D.

Risk register updates

Buy Now
Questions 21

Which of the following governance bodies provides management, operational and technical controls to satisfy security requirements?

Options:

A.

Chief Information Security Officer

B.

Senior Management

C.

Information Security Steering Committee

D.

Business Unit Manager

Buy Now
Questions 22

You are the project manager for GHY Project and are working to create a risk response for a negative risk. You and the project team have identified the risk that the project may not complete on time, as required by the management, due to the creation of the user guide for the software you're creating. You have elected to hire an external writer in order to satisfy the requirements and to alleviate the risk event. What type of risk response have you elected to use in this instance?

Options:

A.

Sharing

B.

Avoidance

C.

Transference

D.

Exploiting

Buy Now
Questions 23

Where can a project manager find risk-rating rules?

Options:

A.

Risk probability and impact matrix

B.

Organizational process assets

C.

Enterprise environmental factors

D.

Risk management plan

Buy Now
Questions 24

You work as a project manager for BlueWell Inc. You are currently working with the project stakeholders to identify risks in your project. You understand that the qualitative risk assessment and analysis can reflect the attitude of the project team and other stakeholders to risk. Effective assessment of risk requires management of the risk attitudes of the participants. What should you, the project manager, do with assessment of identified risks in consideration of the attitude and bias of the participants towards the project risk?

Options:

A.

Document the bias for the risk events and communicate the bias with management

B.

Evaluate and document the bias towards the risk events

C.

Evaluate the bias through SWOT for true analysis of the risk events

D.

Evaluate the bias towards the risk events and correct the assessment accordingly

Buy Now
Questions 25

Which of the following is an entry in an object's discretionary access control list (DACL) that grants permissions to a user or group?

Options:

A.

Access control entry (ACE)

B.

Discretionary access control entry (DACE)

C.

Access control list (ACL)

D.

Security Identifier (SID)

Buy Now
Questions 26

Which of the following is a 1996 United States federal law, designed to improve the way the federal government acquires, uses, and disposes information technology?

Options:

A.

Computer Misuse Act

B.

Lanham Act

C.

Clinger-CohenAct

D.

Paperwork Reduction Act

Buy Now
Questions 27

FITSAF stands for Federal Information Technology Security Assessment Framework. It is a methodology for assessing the security of information systems. Which of the following FITSAF levels shows that the procedures and controls have been implemented?

Options:

A.

Level 4

B.

Level 1

C.

Level 3

D.

Level 5

E.

Level 2

Buy Now
Questions 28

Which of the following RMF phases is known as risk analysis?

Options:

A.

Phase 2

B.

Phase 1

C.

Phase 0

D.

Phase 3

Buy Now
Questions 29

Which of the following assessment methodologies defines a six-step technical security evaluation?

Options:

A.

OCTAVE

B.

FITSAF

C.

DITSCAP

D.

FIPS 102

Buy Now
Questions 30

There are five inputs to the quantitative risk analysis process. Which one of the following is NOT an input to the perform quantitative risk analysis process?

Options:

A.

Risk register

B.

Cost management plan

C.

Risk management plan

D.

Enterprise environmental factors

Buy Now
Questions 31

What component of the change management system is responsible for evaluating, testing, and documenting changes created to the project scope?

Options:

A.

Configuration Management System

B.

Project Management InformationSystem

C.

Scope Verification

D.

Integrated Change Control

Buy Now
Questions 32

Which one of the following is the only output for the qualitative risk analysis process?

Options:

A.

Enterprise environmental factors

B.

Project management plan

C.

Risk register updates

D.

Organizational process assets

Buy Now
Questions 33

In which type of access control do user ID and password system come under?

Options:

A.

Administrative

B.

Technical

C.

Physical

D.

Power

Buy Now
Questions 34

Which of the following statements about role-based access control (RBAC) model is true?

Options:

A.

In this model, the permissions are uniquely assigned to each user account.

B.

In this model, a user can access resources according to his role in the organization.

C.

In this model, the same permission is assigned to each user account.

D.

In this model, the users canaccess resources according to their seniority.

Buy Now
Questions 35

A ________ points to a statement in a policy or procedure that helps determine a course of action.

Options:

A.

Comment

B.

Guideline

C.

Procedure

D.

Baseline

Buy Now
Questions 36

Which of the following NIST C&A documents is the guideline for identifying an information system as a National Security System?

Options:

A.

NIST SP800-53

B.

NIST SP 800-59

C.

NIST SP 800-37

D.

NIST SP 800-53A

Buy Now
Questions 37

Which of the following RMF phases identifies key threats and vulnerabilities that could compromise the confidentiality, integrity, and availability of the institutional critical assets?

Options:

A.

Phase 2

B.

Phase 1

C.

Phase 3

D.

Phase 0

Buy Now
Questions 38

Which of the following formulas was developed by FIPS 199 for categorization of an information system?

Options:

A.

SCinformation system = {(confidentiality, impact), (integrity, controls), (availability, risk)}

B.

SCinformation system = {(confidentiality, risk), (integrity, impact), (availability, controls)}

C.

SCinformation system = {(confidentiality, impact), (integrity, impact), (availability, impact)}

D.

SCinformation system = {(confidentiality, controls), (integrity, controls), (availability, controls )}

Buy Now
Questions 39

Which of the following are the objectives of the security certification documentation task?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

To prepare the Plan of Action and Milestones (POAM) based on the security assessment

B.

To provide the certification findings and recommendations to the information system owner

C.

To assemble the final security accreditation package and then submit it to the authorizing o fficial

D.

To update the system security plan based on the results of the security assessment

Buy Now
Questions 40

Your organization has named you the project manager of the JKN Project. This project has a BAC of $1,500,000 and it is expected to last 18 months. Management has agreed that if the schedule baseline has a variance of more than five percent then you will need to crash the project. What happens when the project manager crashes a project?

Options:

A.

Project costs will increase.

B.

The amount of hours a resource can be used will diminish.

C.

The projectwill take longer to complete, but risks will diminish.

D.

Project risks will increase.

Buy Now
Questions 41

Which of the following fields of management focuses on establishing and maintaining consistency of a system's or product's performance and its functional and physical attributes with its requirements, design, and operational information throughout its life?

Options:

A.

Configuration management

B.

Procurement management

C.

Risk management

D.

Change management

Buy Now
Questions 42

What are the subordinate tasks of the Implement and Validate Assigned IA Control phase in the DIACAP process?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Conduct activities related to the disposition of the system data and objects.

B.

Execute and update IA implementation plan.

C.

Conduct validation activities.

D.

Combine validation results in DIACAP scorecard.

Buy Now
Questions 43

You are the project manager of the GHY Project for your company. You have completed the risk response planning with your project team. You now need to update the WBS. Why would the project manager need to update the WBS after the risk response planning process? Choose the best answer.

Options:

A.

Because of risks associated with work packages

B.

Because of work that was omitted during the WBS creation

C.

Because of risk responses that are now activities

D.

Because of new work generated by the risk responses

Buy Now
Questions 44

The Phase 1 of DITSCAP C&A is known as Definition Phase. The goal of this phase is to define the C&A level of effort, identify the main C&A roles and responsibilities, and create an agreement on the method for implementing the security requirements. What are the process activities of this phase?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Registration

B.

Document mission need

C.

Negotiation

D.

Initial Certification Analysis

Buy Now
Questions 45

Henry is the project manager of the QBG Project for his company. This project has a budget of $4,576,900 and is expected to last 18 months to complete. The CIO, a stakeholder in the project, has introduced a scope change request for additional deliverables as part of the project work.

What component of the change control system would review the proposed changes' impact on the features and functions of the project's product?

Options:

A.

Cost change control system

B.

Scope change control system

C.

Integrated change control

D.

Configuration management system

Buy Now
Questions 46

Information Security management is a process of defining the security controls in order to protect information assets. What are the security management responsibilities?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Evaluating business objectives, security risks, user productivity, and functionality requirem ents

B.

Determining actual goals that are expected to be accomplished from a security program

C.

Defining steps to ensure that all the responsibilities are accounted for and properly address ed

D.

Determining objectives, scope, policies, priorities, standards, and strategies

Buy Now
Questions 47

Which of the following DITSCAP C&A phases takes place between the signing of the initial version of the SSAA and the formal accreditation of the system?

Options:

A.

Phase 3

B.

Phase 1

C.

Phase 2

D.

Phase 4

Buy Now
Questions 48

Harry is a project manager of a software development project. In the early stages of planning, he and the stakeholders operated with the belief that the software they were developing would work with their organization's current computer operating system. Now that the project team has started developing the software it has become apparent that the software will not work with nearly half of the organization's computer operating systems. The incorrect belief Harry had in the software compatibility is an example of what in project management?

Options:

A.

Issue

B.

Risk

C.

Constraint

D.

Assumption

Buy Now
Questions 49

John is the project manager of the NHQ Project for his company. His project has 75 stakeholders, some of which are external to the organization. John needs to make certain that he communicates about risk in the most appropriate method for the external stakeholders. Which project management plan will be the best guide for John to communicate to the external stakeholders?

Options:

A.

Risk Response Plan

B.

Risk Management Plan

C.

Project ManagementPlan

D.

Communications Management Plan

Buy Now
Questions 50

Which of the following statements about System Access Control List (SACL) is true?

Options:

A.

It contains a list of any events that are set to audit for that particular object.

B.

It is a mechanism for reducing the need for globally unique IP addresses.

C.

It contains a list of both users and groups and whatever permissions they have.

D.

It exists for each and every permission entry assigned to any object.

Buy Now
Questions 51

You are the project manager of the NNQ Project for your company and are working you’re your project team to define contingency plans for the risks within your project. Mary, one of your project team members, asks what a contingency plan is. Which of the following statements best defines what a contingency response is?

Options:

A.

Some responses are designed for use only if certain events occur.

B.

Some responses have a cost and a time factor to consider for each risk event.

C.

Some responses must counteract pending risk events.

D.

Quantified risks should always have contingency responses.

Buy Now
Questions 52

Penetration tests are sometimes called white hat attacks because in a pen test, the good guys are attempting to break in. What are the different categories of penetration testing?

Each correct answer represents a complete solution. Choose all that apply.

Options:

A.

Full-box

B.

Zero-knowledge test

C.

Full-knowledge test

D.

Open-box

E.

Partial-knowledge test

F.

Closed-box

Buy Now
Questions 53

FITSAF stands for Federal Information Technology Security Assessment Framework. It is a methodology for assessing the security of information systems. Which of the following FITSAF levels shows that the procedures and controls are tested and reviewed?

Options:

A.

Level 1

B.

Level 2

C.

Level 4

D.

Level 5

E.

Level 3

Buy Now
Questions 54

Which of the following is NOT a responsibility of a data owner?

Options:

A.

Maintaining and protecting data

B.

Ensuring that the necessary security controls are in place

C.

Delegating responsibility of the day-to-day maintenance of the data protection mechanisms to the data custodian

D.

Approving access requests

Buy Now
Questions 55

Amy is the project manager for her company. In her current project the organization has a very low tolerance for risk events that will affect the project schedule. Management has asked Amy to consider the affect of all the risks on the project schedule. What approach can Amy take to create a bias against risks that will affect the schedule of the project?

Options:

A.

She can have the project team pad their time estimates to alleviate delays in the project schedule.

B.

She can shift risk-laden activities that affect the project schedule from the critical path as much as possible.

C.

She can create an overall project rating scheme to reflect the bias towards risks that affect the project schedule.

D.

She can filter all risks based on their affect on schedule versus other project objectives.

Buy Now
Questions 56

You are the program manager for your project. You are working with the project managers regarding the procurement processes for their projects. You have ruled out one particular contract type because it is considered too risky for the program. Which one of the following contract types is usually considered to be the most dangerous for the buyer?

Options:

A.

Cost plus incentive fee

B.

Time and materials

C.

Cost plus percentage of costs

D.

Fixed fee

Buy Now
Questions 57

Which of the following classification levels defines the information that, if disclosed to the unauthorized parties, could be reasonably expected to cause exceptionally grave damage to the national security?

Options:

A.

Secret information

B.

Top Secret information

C.

Confidential information

D.

Unclassified information

Buy Now
Questions 58

You work as a project manager for BlueWell Inc. Management has asked you to work with the key project stakeholder to analyze the risk events you have identified in the project. They would like you to analyze the project risks with a goal of improving the project's performance as a whole.

What approach can you use to achieve the goal of improving the project's performance through risk analysis with your project stakeholders?

Options:

A.

Involve subject matter experts in the risk analysis activities

B.

Focus on the high-priority risks through qualitative risk analysis

C.

Use qualitative risk analysis to quickly assess the probability and impact of risk events

D.

Involve the stakeholders for risk identification only in the phases where the project directlyaffects them

Buy Now
Questions 59

What approach can a project manager use to improve the project's performance during qualitative risk analysis?

Options:

A.

Create a risk breakdown structure and delegate the risk analysis to the appropriate project team members.

B.

Focus on high-priority risks.

C.

Focus on near-term risks first.

D.

Analyze as many risks as possible regardless of who initiated the risk event.

Buy Now
Exam Code: CAP
Exam Name: CAP – Certified Authorization Professional
Last Update: Sep 19, 2024
Questions: 395